Skip to content

Commit 7d6f4fb

Browse files
authored
docs(readme): update before the release (#26)
1 parent 9a7d83e commit 7d6f4fb

5 files changed

Lines changed: 32 additions & 17 deletions

File tree

README.md

Lines changed: 30 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,33 @@
1-
# Secure your CI with Cimon
1+
# 🦫 Secure your CI with Cimon
22

3-
Cimon (pronounced "Simon") detects and stops software supply-chain attacks, including those targeting SolarWinds and CodeCov, through a developer-friendly experience.
3+
![](./pics/cimon-cover.png)
4+
5+
[Cimon](https://cimon.build) (pronounced "Simon") is a runtime security solution that detects and stops software supply-chain attacks on your pipeline, including those targeting SolarWinds and CodeCov, through easy onboarding and a developer-friendly experience.
46

57
By utilizing the revolutionary eBPF technology, Cimon monitors and mitigates attacks within the kernel, denying access to users' assets as soon as they arise.
68

9+
Get started by installing the [GitHub App](https://github.com/marketplace/cimon-by-cycode), or learn more in our docs section - https://docs.cimon.build.
10+
711
This action helps seamlessly deploy the agent into any desired GitHub Actions build. The action is based on the NodeJS engine and contains simple `pre` and `post` scripts to deploy and gracefully shut down the agent.
812

9-
## Getting Started
13+
## 🏃‍♂️ Getting Started with Cimon
14+
15+
Here's a simple three-step process to begin securing your GitHub Actions pipeline:
1016

11-
In order to integrate Cimon with GitHub, simply introduce the action in your GitHub Action workflow as follows:
17+
- Step 1 - Install Cimon [GitHub App](https://github.com/marketplace/cimon-by-cycode). You will be directed to the Cimon platform once the process is complete.
18+
- Step 2 - Generate an API key in the Cimon Platform, which consists of a client ID and a secret. These keys are used to authenticate the user and should be securely stored as GitHub Actions secrets.
19+
- Step 3 - Add Cimon action to your workflow as the first step
20+
21+
We recommend starting Cimon in “Detect Mode” to allow it to learn your environment before applying preventive policies.
1222

1323
``` yaml
14-
steps:
15-
- uses: cycodelabs/cimon-action@v0
16-
with:
17-
prevent: true
18-
allowed-ips: ...
19-
allowed-hosts: ...
24+
- uses: cycodelabs/cimon-action@v0
25+
with:
26+
client-id: ${{ secrets.CIMON_CLIENT_ID }}
27+
secret: ${{ secrets.CIMON_SECRET }}
2028
```
2129
22-
## Usage
30+
## 🔨 Usage
2331
2432
The action supports the following parameters:
2533
@@ -43,13 +51,16 @@ The action supports the following parameters:
4351
| `docker-password` | `false` | Password to pull image from registry (Used for debugging) |
4452
| `log-level` | `info` | Log level (Used for debugging) |
4553

46-
## Scenarios
54+
## ⚙️ Scenarios
4755

4856
### Running Cimon on detect mode
4957

5058
``` yaml
5159
steps:
5260
- uses: cycodelabs/cimon-action@v0
61+
with:
62+
client-id: ${{ secrets.CIMON_CLIENT_ID }}
63+
secret: ${{ secrets.CIMON_SECRET }}
5364
```
5465

5566
### Running Cimon on prevent mode
@@ -58,6 +69,8 @@ steps:
5869
steps:
5970
- uses: cycodelabs/cimon-action@v0
6071
with:
72+
client-id: ${{ secrets.CIMON_CLIENT_ID }}
73+
secret: ${{ secrets.CIMON_SECRET }}
6174
prevent: true
6275
allowed-hosts: >
6376
cycode.com
@@ -69,10 +82,12 @@ steps:
6982
steps:
7083
- uses: cycodelabs/cimon-action@v0
7184
with:
85+
client-id: ${{ secrets.CIMON_CLIENT_ID }}
86+
secret: ${{ secrets.CIMON_SECRET }}
7287
report-process-tree: true
7388
apply-fs-events: true
7489
```
75-
## Security Report
90+
## 🛡️ Security Report
7691

7792
Each pipeline run will report its findings through a security report embedded within the pipeline summary in GitHub Actions.
7893

@@ -86,7 +101,7 @@ When the policy is set to "prevent", any security anomalies matching the profile
86101

87102
![](./pics/prevent-report.png)
88103

89-
## Development
104+
## 🪚 Development
90105

91106
Contributions to GitHub Action are welcome. After changes were made to the `src` folder, these changes should be reflected to the `dist` folder through the following build process:
92107

@@ -103,6 +118,6 @@ The build script will update the actions' entry points code in the [dist](dist)
103118

104119
[ncc]: https://github.com/vercel/ncc
105120

106-
## License
121+
## 🪪 License
107122

108123
[Apache License 2.0](./LICENSE.md)

action.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
name: Cimon Security Action
2-
description: CI/CD Runtime Security Agent for GitHub Actions
1+
name: Cimon by Cycode
2+
description: Runtime Security Solution for your CI/CD Pipeline
33
branding:
44
icon: shield
55
color: green

pics/cimon-cover.png

16.5 KB
Loading

pics/detect-report.png

-25.6 KB
Loading

pics/prevent-report.png

-90.5 KB
Loading

0 commit comments

Comments
 (0)